156

Click here to load reader

Security - Cisco Firewall TRAINING

  • Upload
    xander

  • View
    413

  • Download
    65

Embed Size (px)

DESCRIPTION

Security - Cisco Firewall TRAINING. Course Flow. Day 1. Day 2. Day 3. Nội Dung Mục Tiêu Lịch Học: Trong 5 ngày Sáng từ 9h-11h30 Chiều từ 14h-16h30. Lesson 2: Getting Started with Cisco Security Appliances (continue) Lesson :3 Managing the Security Appliance Lession 4: - PowerPoint PPT Presentation

Citation preview

Page 1: Security - Cisco Firewall TRAINING

Security - Cisco FirewallSecurity - Cisco FirewallTRAINING TRAINING

Page 2: Security - Cisco Firewall TRAINING

Course FlowCourse Flow

Nội Dung

Mục Tiêu

Lịch Học: Trong 5 ngày

Sáng từ 9h-11h30

Chiều từ 14h-16h30

AM

8h30-11h30

Theory

PM

14h-17h

Hand-on Lab

Day 1 Day 2 Day 3

Lesson 1: Cisco Security Appliances Overview Lesson 2: Getting Started with Cisco Security Appliances

Lession 1: Console connection setting

Lession 2: Execute general command

Lession 3: Configure Security Appliance Interfaces

Lesson 2: Getting Started with Cisco Security Appliances (continue)

Lesson :3Managing the Security Appliance Lession 4:Access Control Lists

Lession 4: Configure NAT, and Routing Lession 5: Test the Inside, Outside, and DMZ Interface ConnectivityLession 6 :Configure ACLs on the Security Appliance

Lesson 5: Cisco Adaptive Security Device Manager

Lesson 6: Firewall Switch Modules (FWSM)

Lession 7: Managing the Security Appliance

Page 3: Security - Cisco Firewall TRAINING

IntroductionIntroduction

Trainer Introduction

1. Name:

2. Position :

3. Experiences:

Trainee Introduction

1. Name

2. Position :

3. Security Network knowledges and experiences…

Page 4: Security - Cisco Firewall TRAINING

Lession 1Lession 1 Cisco Security Appliances Overview Cisco Security Appliances Overview

Page 5: Security - Cisco Firewall TRAINING

What Is a Firewall?What Is a Firewall?

Outside

Network

DMZ

Network

Inside

Network

Internet

A firewall is a system or group of systems that manages access between two or more networks.

Page 6: Security - Cisco Firewall TRAINING

Firewall TechnologiesFirewall Technologies

Firewall operations are based on one of three technologies:

Packet filtering Proxy server Stateful packet filtering

Page 7: Security - Cisco Firewall TRAINING

Data A B

Data A C

DMZ:Server B

Inside:Server C

Host A

AB-YesAC-No

Internet

Limits information that is allowed into a network based on the destination and source address

Packet FilteringPacket Filtering

Page 8: Security - Cisco Firewall TRAINING

Proxy ServerProxy Server

Outside

Network

Proxy

Server

Inside

Network

Internet

Requests connections on behalf of a client

Page 9: Security - Cisco Firewall TRAINING

Stateful Packet FilteringStateful Packet Filtering

172.16.0.50

10.0.0.11

1026

80

49091

Syn

172.16.0.50

192.168.0.20

49769

Syn

1026

80

Source portDestination address

Source address

Initial sequence no.Destination port

FlagAck

State Table

DMZ:Server B

Inside:Server C

Host A

Internet

Limits information that is allowed into a network based not only on the destination and source addresses, but also on the packets state table content

Data HTTP A B

Page 10: Security - Cisco Firewall TRAINING

Security Appliances: What Are They?Security Appliances: What Are They?

Cisco security appliances deliver enterprise-class security for small-to-medium-sized business and enterprise networks in a modular, purpose-built appliance. Some features of Cisco security appliances are:

Proprietary operating system Stateful packet inspection User-based authentication Protocol and application inspection Modular policy framework Virtual private networking Security contexts (virtual firewalls) Stateful failover capabilities Transparent firewalls Web-based management solutions

Page 11: Security - Cisco Firewall TRAINING

Proprietary Operating SystemProprietary Operating System

Eliminates the risks associated with general-purpose operating systems

Page 12: Security - Cisco Firewall TRAINING

Stateful Packet InspectionStateful Packet Inspection

The stateful packet inspection algorithm provides stateful connection security.

• It tracks source and destination ports and addresses, TCP sequence numbers, and additional TCP flags.• It randomizes the initial TCP sequence number of each new connection.

By default, the stateful packet inspection algorithm allows connections originating from hosts on inside (higher security level) interfaces.

By default, the stateful packet inspection algorithm drops connection attempts originating from hosts on outside (lower security level) interfaces.

The stateful packet inspection algorithm supports authentication, authorization, and accounting.

Page 13: Security - Cisco Firewall TRAINING

Application-Aware InspectionApplication-Aware Inspection

FTPServer Client

ControlPort2008

DataPort2010

DataPort20

ControlPort21

Data - Port 2010

Port 2010 OK

Data

Protocols such as FTP, HTTP, H.323, and SQL*Net need to negotiate connections to dynamically assigned source or destination ports through the firewall.

The security appliance inspects packets above the network layer.

The security appliance securely opens and closes negotiated ports for legitimate client-server connections through the firewall.

Page 14: Security - Cisco Firewall TRAINING

HeadquartersSystem Engineer

Site B

Executives

Site C

T1

Internet

SEexec

S2S S2S

Internet

Modular PolicyModular Policy

Class MapTraffic Flow

DefaultInternet

Systems EngineerExecutivesSite to Site

Policy MapServicesInspect

IPSPolicePriority

Service PolicyInterface/Global

GlobalOutside

Page 15: Security - Cisco Firewall TRAINING

Virtual Private NetworkVirtual Private Network

B A N K

Site to Site

Remote Access

IPsec VPNSSL VPN

Internet

B A N K

Headquarters

Page 16: Security - Cisco Firewall TRAINING

Security Context (Virtual Firewall)Security Context (Virtual Firewall)

Four Physical Firewalls One Physical FirewallFour Virtual Firewalls

InternetInternet

Ability to create multiple security contexts (virtual firewalls) within a single security appliance

Page 17: Security - Cisco Firewall TRAINING

Failover Capabilities: Active/Standby, Failover Capabilities: Active/Standby, Active/Active, and Stateful FailoverActive/Active, and Stateful Failover

Primary:Failed Firewall

Secondary: Active Firewall

Internet

Failover: Active/Standby

Primary: Failed/Standby

Failover: Active/Active

Secondary: Active/Active

Internet

Contexts

Failover protects the network if the primary security appliance goes offline..

– Active/standby: Only one unit can be actively processing traffic; the other is hot standby.

– Active/Active: Both units can process traffic and serve as backup units.

Stateful failover maintains the operating state during failover.

2121

Page 18: Security - Cisco Firewall TRAINING

Transparent FirewallTransparent Firewall

192.168.1.2

192.168.1.5

Internet

Has the ability to deploy a security appliance in a secure bridging mode

Provides rich Layers 2 through 7 security services as a Layer 2 device

Page 19: Security - Cisco Firewall TRAINING

Web-Based Management SolutionsWeb-Based Management Solutions

Adaptive Security Device

Manager

Page 20: Security - Cisco Firewall TRAINING

Models and Features of Cisco Security Appliances

Page 21: Security - Cisco Firewall TRAINING

ASA 5500 SeriesASA 5500 Series

SMB

Pri

ce

Functionality

Gigabit Ethernet

EnterpriseROBOSOHO SP

ASA 5520

ASA 5540

ASA 5510

ASA 5550

ASA 5505

SP = service provider

Page 22: Security - Cisco Firewall TRAINING

PIX 500 SeriesPIX 500 Series

SMB

Pri

ce

Functionality

Gigabit Ethernet

EnterpriseROBO

PIX 515E

PIX 525

PIX 535

SOHO

PIX 501

PIX 506E

SP

Page 23: Security - Cisco Firewall TRAINING

Cisco ASA 5510 Adaptive Security Cisco ASA 5510 Adaptive Security Appliance Appliance

Delivers advanced security and networking services, including high-performance VPN services, for small and medium-sized businesses and enterprise branch offices

Provides up to 130,000 concurrent connections Provides up to 300-Mbps firewall throughput Provides interface support

• Up to 5 10/100 Fast Ethernet interfaces• Up to 25 VLANs• Up to 5 contexts

Supports failover• Active/standby

Supports VPNs• Site to site (250 peers)• Remote access• WebVPN

Supports optional SSMs (Cisco ASA AIP SSM, Cisco ASA CSC SSM, and four-portGigabit Ethernet SSM)

Page 24: Security - Cisco Firewall TRAINING

Cisco ASA 5520 Adaptive Security Cisco ASA 5520 Adaptive Security Appliance Appliance

Delivers advanced security services, including high-performance VPN services, for medium-sized enterprise networks

Provides up to 280,000 concurrent connections Provides up to 450-Mbps firewall throughput Provides Interface support

• 4 10/100/1000 Gigabit Ethernet interfaces• 1 10/100 Fast Ethernet interface• Up to 100 VLANs• Up to 20 contexts

Supports failover• Active/standby• Active/active

Supports VPNs• Site to site (750 peers)• Remote access• WebVPN

Supports optional SSMs (Cisco ASA AIP SSM, Cisco ASA CSC SSM, and four-portGigabit Ethernet SSM)

Page 25: Security - Cisco Firewall TRAINING

Cisco ASA 5540 Adaptive Security Cisco ASA 5540 Adaptive Security Appliance Appliance

Delivers high-performance, high-density security services, including high-performance VPN services, for medium-sized and large enterprise networks and service provider networks

Provides up to 400,000 concurrent connections Provides up to 650-Mbps firewall throughput Provides Interface support

• 4 10/100/1000 Gigabit Ethernet interfaces• 1 10/100 Fast Ethernet interface• Up to 200 VLANs• Up to 50 contexts

Supports failover• Active/standby• Active/active

Supports VPNs• Site to site (5,000 peers)• Remote access • WebVPN

Supports optional SSMs (Cisco ASA AIP SSM, Cisco ASA CSC SSM, and four-portGigabit Ethernet SSM)

Page 26: Security - Cisco Firewall TRAINING

ASA 5510, 5520, and 5540 Adaptive ASA 5510, 5520, and 5540 Adaptive Security Appliances Front PanelSecurity Appliances Front Panel

Power

Status

Active

Flash

VPN

Cisco Systems, Inc.
note from graphics: the callout info does not match the photo
Page 27: Security - Cisco Firewall TRAINING

ASA 5510, 5520, and 5540 Adaptive ASA 5510, 5520, and 5540 Adaptive Security Appliances Back PanelSecurity Appliances Back Panel

Security servicesmodule

Fixed interfaces

CompactFlash

Page 28: Security - Cisco Firewall TRAINING

ASA 5510, 5520, and 5540 Adaptive ASA 5510, 5520, and 5540 Adaptive Security Appliances ConnectorsSecurity Appliances Connectors

Four 10/100/1000Gigabit Ethernet ports*

10/100 out-of-bandmanagement port

AUX ports

CompactFlash

Two USB 2.0 ports

Power supply(AC or DC)

Console port

*ASA 5510 Adaptive Security Appliance supports 10/100 Fast Ethernet ports.

Page 29: Security - Cisco Firewall TRAINING

Cisco ASA Security Services ModuleCisco ASA Security Services Module

High-performance module designed to provide additional security services

Diskless (Flash-based) design for improved reliability

Gigabit Ethernet port for out-of-band management

Page 30: Security - Cisco Firewall TRAINING

•SSM ModelsSSM Models

Power Status

Speed

Link andactivity

SSM-10

2.0-GHz processor

1.0 GB RAM

SSM-20

2.4-GHz processor

2.0 GB RAM

Page 31: Security - Cisco Firewall TRAINING

Four-Port Gigabit Ethernet SSMFour-Port Gigabit Ethernet SSM

RJ-45 linkLED

RJ-45speedLED

SFP linkLED

SFPspeedLED

RJ-45ports

PowerLED

StatusLED SFP

ports

Page 32: Security - Cisco Firewall TRAINING

SummarySummary

A firewall is a system or group of systems that manages access between two or more networks.

Statefull firewall is a device works most effectively Cisco Security Appliance including Cisco PIX and ASA. Security devices ASA 5510, 5520 targeting the small and medium

enterprises. The function of security devices can be expanded by the SSMs

Page 33: Security - Cisco Firewall TRAINING

Lession 2Lession 2

Getting Started with Cisco Security Appliances

Page 34: Security - Cisco Firewall TRAINING

User Interface

Page 35: Security - Cisco Firewall TRAINING

ciscoasa>

ciscoasa#

ciscoasa(config)#

monitor>

A Cisco security appliance has four main administrative access modes:

UnprivilegedPrivilegedConfiguration

Monitor

Security Appliance Access ModesSecurity Appliance Access Modes

Page 36: Security - Cisco Firewall TRAINING

ciscoasa> enable

password:

ciscoasa#

enable [priv_level]

ciscoasa>

Used to control access to the privileged mode

Enables you to enter other access modes

Access Privileged ModeAccess Privileged Mode

Internet

Page 37: Security - Cisco Firewall TRAINING

Access Configuration Mode: configure Access Configuration Mode: configure terminal Commandterminal Command

configure terminal

ciscoasa#

Used to start configuration mode to enter configuration commands from a terminal

ciscoasa> enable

password:

ciscoasa# configure terminal

ciscoasa(config)# exit

ciscoasa# exit

ciscoasa>

exit

ciscoasa#

Used to exit from an access mode

Page 38: Security - Cisco Firewall TRAINING

ciscoasa > help ?

enable Turn on privileged commands

exit Exit the current command mode

login Log in as a particular user

logout Exit from current user profile to unprivileged mode

perfmon Change or view performance monitoring options

ping Test connectivity from specified interface to an IP address

quit Exit the current command mode

ciscoasa > help enable

USAGE:

enable [<priv_level>]

help Commandhelp Command

Page 39: Security - Cisco Firewall TRAINING

File Management

Page 40: Security - Cisco Firewall TRAINING

The following commands enable you to view your configuration:

Show running-config Show startup-config

The following commands enable you to save your configuration:

copy run start write memory

To save configuration changes:

copy run start

running-

config

startup-

config

(saved)

Configuration

Changes

Viewing and Saving Your ConfigurationViewing and Saving Your Configuration

Page 41: Security - Cisco Firewall TRAINING

Clearing Running ConfigurationClearing Running Configuration

ciscoasa(config)#

clear configure all

Clears the running configuration

ciscoasa(config)# clear config all

Clear the running configuration:

clear config all

running-

config

(default)

startup-

config

Page 42: Security - Cisco Firewall TRAINING

Clearing Startup ConfigurationClearing Startup Configuration

ciscoasa#

write erase

Clears the startup configuration

ciscoasa# write erase

Clear the startup configuration:

write erase

running-

config

startup-

config

(default)

Page 43: Security - Cisco Firewall TRAINING

Reload the Configuration: reload Reload the Configuration: reload CommandCommand

Reboots the security appliance and reloads the configuration

Allows scheduled reboots

ciscoasa# reload

Proceed with reload?[confirm] y

Rebooting...

reload [at hh:mm [month day | day month]] [cancel] [in [hh:]mm] [max-hold-time [hh:]mm] [noconfirm] [quick] [reason text] [save-config]

ciscoasa#

Page 44: Security - Cisco Firewall TRAINING

File SystemFile System

Release 7.0and later

Software image Configuration file Private data ASDM image Backup image* Backup

configuration file*

Page 45: Security - Cisco Firewall TRAINING

Displaying Stored Files: System and Displaying Stored Files: System and ConfigurationConfiguration

Display the directory contents

ciscoasa#

PIX Security Appliance

flash:

ASA

disk0:

disk1:

ciscoasa# dir

Directory of disk0:/

8 -rw- 8202240 13:37:33 Jul 28 2006 asa721-k8.bin

1264 -rw- 5539756 13:21:13 Jul 28 2006 asdm-521.bin

62947328 bytes total (49152000 bytes free)

dir [/all] [/recursive] [all-filesystems] [disk0: | disk1: | flash: | system:]

Internet

Page 46: Security - Cisco Firewall TRAINING

Security Level ExampleSecurity Level Example

Outside Network

GigabitEthernet0/0

Security level 0

Interface name = outside

DMZ Network

GigabitEthernet0/2

Security level 50

Interface name = DMZ

Inside Network

GigabitEthernet0/1

Security level 100

Interface name = inside

g0/0

g0/2

g0/1Internet

Page 47: Security - Cisco Firewall TRAINING

Examining Security Appliance Status

Page 48: Security - Cisco Firewall TRAINING

asa1# show interfaceInterface GigabitEthernet0/0 "outside", is up, line protocol is up Detected: Speed 1000 Mbps, Full-duplex Requested: Auto MAC address 000b.fcf8.c538, MTU 1500 IP address 192.168.1.2, subnet mask 255.255.255.0 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 packets output, 0 bytes, 0 underruns input queue (curr/max blocks): hardware (0/0) software (0/0) output queue (curr/max blocks): hardware (0/0) software (0/0) Received 0 VLAN untagged packets, 0 bytes Transmitted 0 VLAN untagged packets, 0 bytes Dropped 0 VLAN untagged packets

show Commandsshow Commands

asa1# show run interface. . .interface GigabitEthernet0/0 speed 1000 duplex full nameif outside security-level 0 ip address 192.168.1.2 255.255.255.0!interface GigabitEthernet0/1 speed 1000 duplex full nameif inside security-level 100 ip address 10.0.1.1 255.255.255.0 . . .

show run interface

show interface

Page 49: Security - Cisco Firewall TRAINING

asa1# show memory

Free memory: 468962336 bytes (87%)

Used memory: 67908576 bytes (13%)

------------- ----------------

Total memory: 536870912 bytes (100%)

show memory Commandshow memory Command

ciscoasa#

show memory

Page 50: Security - Cisco Firewall TRAINING

asa1# show cpu usage

CPU utilization for 5 seconds = 0%; 1 minute: 0%; 5 minutes: 0%

show cpu usage Commandshow cpu usage Command

ciscoasa#

show cpu usage

10.0.1.11

10.0.1.4

Internet

Page 51: Security - Cisco Firewall TRAINING

show version Commandshow version Commandasa1# show versionCisco Adaptive Security Appliance Software Version 7.2(1)Device Manager Version 5.2(1)

Compiled on Wed 31-May-06 14:45 by rootSystem image file is "disk0:/asa721-k8.bin"Config file at boot was "startup-config"

ciscoasa up 2 mins 51 secs

Hardware: ASA5520, 512 MB RAM, CPU Pentium 4 Celeron 2000 MHzInternal ATA Compact Flash, 64MBBIOS Flash AT49LW080 @ 0xffe00000, 1024KB. . .

Page 52: Security - Cisco Firewall TRAINING

asa1# show ip address

System IP Addresses:

Interface Name IP address Subnet mask Method

GigabitEthernet0/0 outside 192.168.1.2 255.255.255.0 CONFIG

GigabitEthernet0/1 inside 10.0.1.1 255.255.255.0 CONFIG

GigabitEthernet0/2 dmz 172.16.1.1 255.255.255.0 CONFIG

Current IP Addresses:

Interface Name IP address Subnet mask MethodGigabitEthernet0/0 outside 192.168.1.2 255.255.255.0 CONFIGGigabitEthernet0/1 inside 10.0.1.1 255.255.255.0 CONFIG GigabitEthernet0/2 dmz 172.16.1.1 255.255.255.0 CONFIG

show ip address Commandshow ip address Command

Internet192.168.1.0 10.0.1.0 10.1.1.0

172.16.1.0

.2

.1

.1 .1

Page 53: Security - Cisco Firewall TRAINING

asa1# show interfaceInterface GigabitEthernet0/0 "outside", is up, line protocol is up Hardware is i82546GB rev03, BW 1000 Mbps Full-Duplex(Full-duplex), 100 Mbps(100 Mbps) MAC address 0013.c482.2e4c, MTU 1500 IP address 192.168.1.2, subnet mask 255.255.255.0 8 packets input, 1078 bytes, 0 no buffer Received 8 broadcasts, 0 runts, 0 giants 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 L2 decode drops 0 packets output, 0 bytes, 0 underruns 0 output errors, 0 collisions 0 late collisions, 0 deferred input queue (curr/max blocks): hardware (8/0) software (0/0) output queue (curr/max blocks): hardware (0/0) software (0/0) Traffic Statistics for "outside": 8 packets input, 934 bytes 0 packets output, 0 bytes 8 packets dropped 1 minute input rate 0 pkts/sec, 0 bytes/sec 1 minute output rate 0 pkts/sec, 0 bytes/sec 1 minute drop rate, 0 pkts/sec 5 minute input rate 0 pkts/sec, 0 bytes/sec 5 minute output rate 0 pkts/sec, 0 bytes/sec 5 minute drop rate, 0 pkts/sec

show interface Commandshow interface Command

Page 54: Security - Cisco Firewall TRAINING

show nameif Commandshow nameif Command

asa1# show nameifInterface Name SecurityGigabitEthernet0/0 outside 0GigabitEthernet0/1 inside 100

GigabitEthernet0/2 dmz 50

GigabitEthernet0/0

Interface name = outside

Security level = 0

GigabitEthernet0/2

Interface name = dmz

Security level = 50

GigabitEthernet0/1

Interface name = inside

Security level = 100

g0/0

g0/2

g0/1Internet

Page 55: Security - Cisco Firewall TRAINING

show run nat Commandshow run nat Command

asa1# show run nat

nat (inside) 1 10.0.1.0 255.255.255.0 0 0

Displays a single host or range of hosts to be translated

ciscoasa#

show run nat

10.0.1.11

10.0.1.4

10.0.1.XX.X.X.X

NAT

Internet

Page 56: Security - Cisco Firewall TRAINING

show run global Commandshow run global Command

asa1# show run global

global (outside) 1 192.168.1.20-192.168.1.254 netmask 255.255.255.0

Displays the pool of mapped addresses

ciscoasa#

show run global

Mapped Pool

192.168.1.20-192.168.1.254

10.0.1.11

10.0.1.4

10.0.1.X

Internet

Page 57: Security - Cisco Firewall TRAINING

show xlate Commandshow xlate Command

asa1# show xlate

1 in use, 1 most used

Global 192.168.1.20 Local 10.0.1.11

Displays the contents of the translation slots

ciscoasa#

show xlate

192.168.1.2010.0.1.11

10.0.1.4

10.0.1.11

Inside

local

Outside

mapped pool

10.0.1.11192.168.1.20

Xlate Table

Internet

Page 58: Security - Cisco Firewall TRAINING

show route Commandshow route Command

asa1(config)# show route

S 0.0.0.0 0.0.0.0 [1/0] via 192.168.1.1, outside

C 10.0.1.0 255.255.255.0 is directly connected, inside

C* 127.0.0.0 255.255.0.0 is directly connected, cplane

C 172.16.1.0 255.255.255.0 is directly connected, dmz

C 192.168.1.0 255.255.255.0 is directly connected, outside

g0/0

g0/2

g0/1Internet

10.0.1.0192.168.1.0

.1

172.16.1.0

Displays the contents of the routing table

ciscoasa#

show route [interface_name [ip_address [netmask [static]]]]

Page 59: Security - Cisco Firewall TRAINING

ping Commandping Command

Determines whether other devices are visible from the security appliance

asa1# ping 10.0.1.11

Sending 5, 100-byte ICMP Echos to 10.0.1.11, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 10/12/20 ms

ping [if_name] host [data pattern] [repeat count] [size bytes] [timeout seconds] [validate]

ciscoasa#

10.0.1.11

10.0.1.4

Internet

Page 60: Security - Cisco Firewall TRAINING

traceroute Commandtraceroute Command

asa1#traceroute 172.26.26.20

traceroute {destination_ip | hostname} [source source_ip | source-interface] [numeric] [timeout timeout_value] [probe probe_num] [ttl min_ttl max_ttl] [port port_value] [use-icmp]

ciscoasa#

Determines the route packets will take to their destination

Internet

example.com

Page 61: Security - Cisco Firewall TRAINING

Basic Security Appliance Configuration

Page 62: Security - Cisco Firewall TRAINING

Basic CLI Commands for Security Basic CLI Commands for Security Appliances Appliances

hostname interface

• nameif• ip address• security-level• speed• duplex• no shutdown

nat-control nat global route

g0/0

g0/2

g0/1Internet

Page 63: Security - Cisco Firewall TRAINING

Assigning a Hostname to Security Assigning a Hostname to Security Appliance: Changing the CLI PromptAppliance: Changing the CLI Prompt

ciscoasa(config)#

Changes the hostname in the security appliance CLI prompt

ciscoasa(config)# hostname asa1asa1(config)#

hostname newname

New York ( asa1)

Server

Boston

(asa2)

Server

Server

Dallas

(asa3)

Internet

Page 64: Security - Cisco Firewall TRAINING

interface {physical_interface[.subinterface] | mapped_name}

ciscoasa(config)#

asa1(config)# interface GigabitEthernet0/0

asa1(config-if)#

interface Command and interface Command and SubcommandsSubcommands

Enters configuration mode for the interface you specify

GigabitEthernet0/0

GigabitEthernet0/2

GigabitEthernet0/1

g0/0

g0/2

g0/1Internet

Page 65: Security - Cisco Firewall TRAINING

nameif if_name

ciscoasa(config-if)#

asa1(config)# interface GigabitEthernet0/0

asa1(config-if)# nameif outside

Assign an Interface Name:Assign an Interface Name:nameif Subcommandnameif Subcommand

Assigns a name to an interface on the security appliance.

GigabitEthernet0/2

Interface name = dmz

GigabitEthernet0/0

Interface name = outside

GigabitEthernet0/1

Interface name = inside

g0/0

g0/2

g0/1Internet

Page 66: Security - Cisco Firewall TRAINING

ip address ip_address [mask] [standby ip_address]

ciscoasa(config-if)#

Assign Interface IP Address: Assign Interface IP Address: ip address Subcommandip address Subcommand

Assigns an IP address to each interface

asa1(config)# interface GigabitEthernet0/0

asa1(config-if)# nameif outside

asa1(config-if)# ip address 192.168.1.2 255.255.255.0

GigabitEthernet0/0

Interface name = outside

IP address = 192.168.1.2

g0/0

g0/2

g0/1Internet

Page 67: Security - Cisco Firewall TRAINING

DHCP-Assigned AddressDHCP-Assigned Address

asa1(config)# interface GigabitEthernet0/0

asa1(config-if)# nameif outside

asa1(config-if)# ip address dhcp

ciscoasa(config-if)#

ip address dhcp [setroute]

Enables the DHCP client feature on the outside interface

GigabitEthernet0/0

Interface name = outside

IP address = dhcp

g0/0

DHCP

Assigned

Internet

Page 68: Security - Cisco Firewall TRAINING

security-level number

ciscoasa(config-if)#

Assign a Security Level: security-level Assign a Security Level: security-level SubcommandsSubcommands

Assigns a security level to the interface

asa1(config)# interface GigabitEthernet0/0

asa1(config-if)# nameif outside

asa1(config-if)# ip address 192.168.1.2

asa1(config-if)# security-level 0

GigabitEthernet0/0

Interface name = outside

IP address = 192.168.1.2

Security level = 0

g0/0

g0/2

g0/1Internet

Page 69: Security - Cisco Firewall TRAINING

Enables communication between interfaces with the same security level or allows traffic to enter and exit the same interface

ciscoasa(config)#

asa1(config)# same-security-traffic permit inter-interface

same-security-traffic permit {inter-interface | intra-interface}

DMZ NetworkGigabitEthernet0/2

Security level 100

Interface name = dmz

g0/0

g0/2

g0/1Internet

Inside NetworkGigabitEthernet0/1

Security level 100

Interface name = inside

Interfaces with Same Security Level: Interfaces with Same Security Level: same-security-traffic Commandsame-security-traffic Command

Page 70: Security - Cisco Firewall TRAINING

speed {10 | 100 | 1000 | auto | nonegotiate}

duplex {auto | full | half}

Assign an Interface Speed and Duplex: Assign an Interface Speed and Duplex: speed and duplex SubCommandsspeed and duplex SubCommands

Enable the interface speed and duplex

ciscoasa(config-if)#

GigabitEthernet0/0

Speed =1000

Duplex = full

g0/0

g0/2

g0/1Internet

asa1(config)# interface GigabitEthernet0/0

asa1(config-if)# nameif outside

asa1(config-if)# ip address 192.168.1.2

asa1(config-if)# security-level 0

asa1(config-if)# speed 1000

asa1(config-if)# duplex full

Page 71: Security - Cisco Firewall TRAINING

management-only

ciscoasa(config-if)#

ASA Management InterfaceASA Management Interface

Disables management-only mode (for ASA 5520, 5540 and 5550)asa1(config)# interface management0/0

asa1(config-if)# no management-only

no management-only

Configures an interface to accept management traffic only

Disables management-only mode

Management0/0

Management only = no

g0/0

g0/2

g0/1Internet

m0/0

Page 72: Security - Cisco Firewall TRAINING

Disables management-only mode (for ASA 5520, 5540 and 5550)asa1(config)# interface GigabitEthernet0/0

asa1(config-if)# no shutdown

shutdown

Disables an interface

no shutdown = enabled

ciscoasa(config-if)#

GigabitEthernet0/0

Enabled

g0/0

g0/2

g0/1Internet

Enabling and Disabling Interfaces: Enabling and Disabling Interfaces: shutdown Subcommandshutdown Subcommand

Page 73: Security - Cisco Firewall TRAINING

Network Address Translation Network Address Translation

Inside

Local

Outside

Mapped Pool

10.0.0.11192.168.0.20

10.0.0.11

10.0.0.4Translation Table

10.0.0.11192.168.0.20

192.168.10 .11

NAT

Internet

Page 74: Security - Cisco Firewall TRAINING

Enable NAT Control Enable NAT Control

asa1(config)# nat-control

Enable or disable NAT configuration requirement

Inside

Local

Outside

Mapped Pool

10.0.0.11192.168.0.20

10.0.0.11

10.0.0.4Translation Table

10.0.0.11192.168.0.20

200.200.200.11

NAT

Internet

Page 75: Security - Cisco Firewall TRAINING

nat (if_name) nat_id address [netmask] [dns]

ciscoasa(config)#

nat Commandnat Command

Enables IP address translation

asa1(config)# nat (inside) 1 0.0.0.0 0.0.0.0

10.0.1.11

10.0.1.4

10.0.1.11X.X.X.X

NAT

Internet

Page 76: Security - Cisco Firewall TRAINING

global Commandglobal Command

Works with the nat command to assign a registered or public IP address to an internal host when accessing the outside network through the firewall, for example, 192.168.0.20-192.168.0.254

asa1(config)# nat (inside) 1 0.0.0.0 0.0.0.0

asa1(config)# global (outside) 1 192.168.1.20-192.168.1.254

global(if_name) nat_id {mapped_ip[-mapped_ip][netmask mapped_mask]} | interface

ciscoasa(config)#

10.0.1.11

10.0.1.4

10.0.1.11192.168.1.20

NAT

Internet

Page 77: Security - Cisco Firewall TRAINING

route if_name ip_address netmask gateway_ip [metric]

ciscoasa(config)#

Configure a Static Route: route Configure a Static Route: route CommandCommand

Defines a static or default route for an interface

asa1(config)# route outside 0.0.0.0 0.0.0.0 192.168.1.1 1

asa1(config)# route inside 10.1.1.0 255.255.255.0 10.0.1.102 1

192.168.1.110.1.1.11

10.1.1.4

Default Route

10.0.1.102

Static Route

Internet

Page 78: Security - Cisco Firewall TRAINING

asa1(config)# names

asa1(config)# name 172.16.1.2 bastionhost

asa1(config)# name 10.0.1.11 insidehost

Host Name-to-IP-Address Mapping: Host Name-to-IP-Address Mapping: name Commandname Command

Configures a list of name-to-IP-address mappings on the security appliance

name ip_address name

ciscoasa(config)#

.2

.1

10.0.1.0

.1Internet

“bastionhost”

172.16.1.2

172.16.1.0

.11

“insidehost”

10.0.1.11

Page 79: Security - Cisco Firewall TRAINING

Configuration ExampleConfiguration Example

asa1(config)# write terminal

. . .

interface GigabitEthernet0/0

speed 1000

duplex full

nameif outside

security-level 0

ip address 192.168.1.2 255.255.255.0

interface GigabitEthernet0/1

speed 1000

duplex full

nameif inside

security-level 100

ip address 10.0.1.1 255.255.255.0 . . .

GigabitEthernet0/0

Interface name = outside

Security level = 0

IP address = 192.168.1.2

GigabitEthernet0/1

Interface name = inside

Security level = 100

IP address = 10.0.1.1

172.16.1.0 .1

10.0.1.0

.1

192.168.1.0

.2

10.1.1.0

.1Internet

Page 80: Security - Cisco Firewall TRAINING

Configuration Example (Cont.)Configuration Example (Cont.)

interface GigabitEthernet0/2

nameif dmz

security-level 50

speed 1000

duplex full

ip address 172.16.1.1 255.255.255.0

passwd 2KFQnbNIdI.2KYOU encrypted

hostname asa1

names

name 172.16.1.2 bastionhost

name 10.1.1.11 insidehost

172.16.1.0.1

10.0.1.0

.1

192.168.1.0

.2

10.1.1.0

.1

GigabitEthernet0/2

Interface name = dmz

Security level = 50

IP address = 172.16.1.1“insidehost”

10.1.1.11

“bastionhost”

172.16.1.2

Internet

Page 81: Security - Cisco Firewall TRAINING

Configuration Example (Cont.)Configuration Example (Cont.)

nat-control

nat (inside) 1 0.0.0.0 0.0.0.0 0 0

global (outside) 1 192.168.1.20-192.168.1.254

route outside 0.0.0.0 0.0.0.0 192.168.1.1 1

route inside 10.1.1.0 255.255.255.0 10.0.1.102 1

10.0.0.0Mapped Pool

192.168.1.20 - 254

172.16.1.0 .2

.1

.102

“insidehost”

10.1.1.11

“bastionhost”

172.16.1.2

10.0.1.0

.1

192.168.1.0

.2.1

10.1.1.0

.1

Default Route Static Route

Internet

Page 82: Security - Cisco Firewall TRAINING

SummarySummary

Cisco security appliances have four main administrative access modes: unprivileged, privileged, configuration, and monitor.

There are two configuration memories in the Cisco security appliances: running configuration and startup configuration.

The show running-config command displays the current configuration in the security appliance RAM on the terminal.

You can use the copy run start or the write memory command to save the current running configuration to flash memory, startup configuration.

Interfaces with a higher security level can access interfaces with a lower security level, but interfaces with a lower security level cannot access interfaces with a higher security level unless given permission.

The security appliance show commands help you manage the security appliance.

The basic commands that are necessary to configure Cisco security appliances are the following: interface, nat, global, and route.

The nat and global commands work together to translate IP addresses.

Page 83: Security - Cisco Firewall TRAINING

Lession 3Lession 3

Managing the Security Appliance

Page 84: Security - Cisco Firewall TRAINING

Managing System Access

Page 85: Security - Cisco Firewall TRAINING

telnet {{hostname | IP_address mask interface_name} | {IPv6_address interface_name} | {timeout number}}

ciscoasa(config)#

asa1(config)# telnet 10.0.0.11 255.255.255.255 inside

asa1(config)# telnet timeout 15 

asa1(config)# passwd telnetpass

Enables you to specify which hosts can access the security appliance console with Telnet and set the maximum time a console Telnet session can be idle before being logged off by the security appliance

Sets the password for Telnet access to set the security appliance

passwd password [encrypted]

ciscoasa(config)#

10.0.0.11TelnetInternet

Configuring Telnet Access to the Configuring Telnet Access to the Security Appliance ConsoleSecurity Appliance Console

Page 86: Security - Cisco Firewall TRAINING

Viewing and Disabling TelnetViewing and Disabling Telnet

kill telnet_id

ciscoasa#

Terminates a Telnet session

Enables you to view which IP addresses are currently accessing the security appliance console via Telnet

who [local_ip]

ciscoasa#

Removes the Telnet connection and the idle timeout from the configuration

clear configure telnet

ciscoasa(config)#

Displays IP addresses permitted to access the security appliance via Telnet

show running-config telnet [timeout]

ciscoasa#

Page 87: Security - Cisco Firewall TRAINING

SSH Connections to the Security SSH Connections to the Security ApplianceAppliance

SSH connections to the security appliance: Provide secure remote access Provide strong authentication and encryption Require RSA key pairs for the security appliance Require 3DES/AES or DES activation keys Allow up to five SSH clients to simultaneously access

the security appliance console Use the Telnet password for local authentication

Page 88: Security - Cisco Firewall TRAINING

crypto key zeroize {rsa | dsa} [label key-pair-label] [default] [noconfirm]

Configuring SSH Access to the Configuring SSH Access to the Security Appliance ConsoleSecurity Appliance Console

Removes any previously generated RSA keys

ciscoasa(config)#

Saves the CA state

write memory

ciscoasa(config)#

Configures the domain name

domain-name name

ciscoasa(config)#

Generates an RSA key pair

crypto key generate rsa [usage-keys | general-keys] [label key-pair-label] [modulus size] [noconfirm]

ciscoasa(config)#

Specifies the host or network authorized to initiate an SSH connection

ssh {ip_address mask | ipv6_address/prefix} interface

ciscoasa(config)#

Specifies how long a session can be idle before being disconnected

ssh timeout number

ciscoasa(config)#

Page 89: Security - Cisco Firewall TRAINING

asa1(config)# crypto key zeroize rsa

asa1(config)# write memory

asa1(config)# domain-name cisco.com

asa1(config)# crypto key generate rsa modulus 1024

asa1(config)# write memory

asa1(config)# ssh 172.26.26.50 255.255.255.255 outside

asa1(config)# ssh timeout 30

172.26.26.50

SSH

username: pix

password: telnetpassword

Internet

Connecting to the Security Appliance Connecting to the Security Appliance with an SSH Clientwith an SSH Client

Page 90: Security - Cisco Firewall TRAINING

Managing Software, Licenses, and Configurations

Page 91: Security - Cisco Firewall TRAINING

Viewing Directory ContentsViewing Directory Contents

Displays the directory contents

dir [/all] [/recursive] [all-filesystems | [disk0: | disk1: | flash: | system:] path]

ciscoasa#

asa1# dir

Directory of disk0:/

4346 -rw- 8202240 15:01:10 Oct 19 2006 asa721-k8.bin

6349 -rw- 5539756 15:30:39 Oct 19 2006 asdm521.bin

7705 -rw- 3334 07:03:57 Oct 22 2006 old_running.cfg

62947328 bytes total (29495296 bytes free)

10.0.0.3

10.0.0.11

192.168.0.0

dirInternet

You can use the pwd command to display the current working directory.

Page 92: Security - Cisco Firewall TRAINING

Copying FilesCopying Files

Copies a file from one location to another

copy [/noconfirm | /pcap] {url | running-config | startup-config} {running-config | startup-config | url}

ciscoasa#

asa1# copy disk0:MYCONTEXT.cfg startup-config

10.0.0.3

10.0.0.11

192.168.0.0

copyInternet

Copies the file MYCONTEXT.cfg from disk0 to the startup configuration

Page 93: Security - Cisco Firewall TRAINING

ciscoasa#

ciscoasa#

Downloading and Backing Up Downloading and Backing Up Configuration Files ExampleConfiguration Files Example

Copies the configuration file from an FTP server

Copies the configuration file to an FTP server

10.0.0.3

10.0.0.11

192.168.0.0

FTP server

configInternet

copy ftp: startup-config

copy running-config ftp:

Page 94: Security - Cisco Firewall TRAINING

Image Upgrade

Page 95: Security - Cisco Firewall TRAINING

Viewing Version InformationViewing Version Information

asa1# show version

Cisco Adaptive Security Appliance Software Version 7.2(1)

Device Manager Version 5.2(1)

Compiled on Wed 31-May-06 14:45 by root

System image file is “disk0:/asa721-k8.bin”

Config file at boot was “startup-config”

asa1 up 17 hours 40 mins . . .

show version

ciscoasa#

Displays the software version, hardware configuration, license key, and related uptime data

10.0.0.3

10.0.0.11version?

Internet

Page 96: Security - Cisco Firewall TRAINING

Image UpgradeImage Upgrade

asa1# copy tftp://10.0.0.3/asa721-k8.bin flash

copy tftp://server[/path]/filename flash:/filename

ciscoasa#

Enables you to change software images without accessing the TFTP monitor mode.

The TFTP server at IP address 10.0.0.3 receives the command and determines the actual file location from its root directory information. The server then downloads the TFTP image to the security appliance.

10.0.0.3

10.0.0.11

TFTPInternet

Page 97: Security - Cisco Firewall TRAINING

SummarySummary

SSH provides secure remote management of the security appliance. TFTP is used to upgrade the software image on security appliances. You can enable Telnet to the security appliance on all interfaces.

.

Page 98: Security - Cisco Firewall TRAINING

Lesson 4Lesson 4

Access Control Lists (ACLs)

Page 99: Security - Cisco Firewall TRAINING

Security Appliance ACL Security Appliance ACL ConfigurationConfiguration

Outside Inside

ACL for

Inbound Access

ACL for

Outbound Access

No ACL

- Outbound permitted by default

- Inbound denied by default

Security appliance configuration philosophy is interface-based.Interface ACL permits and denies the initial incoming and outgoing packets on that

interface.

An ACL must describe only the initial packet of the application; return traffic does not need to be described.

If no ACL is attached to an interface:

The outbound packet is permitted by default.

The inbound packet is denied by default.

Internet

Page 100: Security - Cisco Firewall TRAINING

Inbound Traffic to DMZ Web ServerInbound Traffic to DMZ Web Server

There is no ACL, so by default, inbound access is denied. To permit inbound traffic, complete the following steps:

Configure a static translation for the web server address

Configure an inbound ACL

Apply the ACL to the outside interface

192.168.1.0

10.0.1.0

Public Web Server

DMZ

Inside

Outside.2.1

InboundX

Internet

Page 101: Security - Cisco Firewall TRAINING

192.168.1.0

10.0.1.0

Public Web Server

DMZ

Inside

Outside.2.1

192.168.1.9

172.16.1.2

Maps an inside private address to an outside public address

asa1(config)# static (DMZ,outside) 192.168.1.9 172.16.1.2 0 0

Create a Static Translation for Web Create a Static Translation for Web ServerServer

Internet

Page 102: Security - Cisco Firewall TRAINING

access-list Commandaccess-list Command

Permits outside HTTP traffic to access the public web server

asa1(config)# access-list ACLOUT permit tcp any host 192.168.1.9 eq www

ciscoasa(config)#

access-list id [line line-number] [extended] {deny | permit} {protocol | object-group protocol_obj_grp_id}{host sip | sip smask | interface ifc_name | object-group network_obj_grp_id | any} [operator port [port] | object-group service_obj_grp_id] {host dip | dip dmask | interface ifc_name | object-group network_obj_grp_id | any} [operator port [port] | object-group service_obj_grp_id | object-group icmp_type_obj_group_id] [log [[level] [interval secs] | disable | default]] [inactive | time-range time_range_name]

192.168.1.0

10.0.1.0

Public Web Server

DMZ

Inside

Outside.2.1

192.168.1.9

172.16.1.2Permit Inbound

HTTP

Internet

Page 103: Security - Cisco Firewall TRAINING

access-group Commandaccess-group Command

192.168.1.0

10.0.1.0

Public Web Server

DMZ

Inside

Outside.2.1

Applies an ACL to an interface

asa1(config)# access-group ACLOUT in interface outside

Apply ACL

to interface

ciscoasa(config)#

access-group access-list {in | out} interface interface_name [per-user-override]

Internet

Page 104: Security - Cisco Firewall TRAINING

showshow access-list Commandaccess-list Command

asa1(config)# show access-list

access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)

alert-interval 300

access-list ACLOUT; 4 elements

access-list ACLOUT line 1 extended permit tcp 192.168.6.0 255.255.255.0 host 192.168.1.11 eq www (hitcnt=4)0x984ebd70

access-list ACLOUT line 2 extended permit tcp host 192.168.6.10 host 192.168.1.11 eq ftp (hitcnt=1) 0x53490ecd

access-list ACLOUT line 3 extended permit tcp any host 192.168.1.9 eq www (hitcnt=8) 0x83af39ca

access-list ACLOUT line 4 extended deny ip any any (hitcnt=4) 0x2ca30385

access-list ICMPDMZ; 1 elements

access-list ICMPDMZ line 1 extended permit icmp host bastionhost any echo-reply

ICMPDMZ

ACLINACLOUT

192.168.1.0192.168.6.10

Internet

Page 105: Security - Cisco Firewall TRAINING

clear access-list counters Commandclear access-list counters Command

asa1(config)# clear access-list ACLOUT counters

asa1(config)# show access-list

access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)

alert-interval 300

access-list ACLOUT; 4 elements

access-list ACLOUT line 1 extended permit tcp 192.168.6.0 255.255.255.0 host 192.168.1.11 eq www (hitcnt=0) 0x984ebd70

access-list ACLOUT line 2 extended permit tcp host 192.168.6.10 host 192.168.1.11 eq ftp (hitcnt=0) 0x53490ecd

access-list ACLOUT line 3 extended permit tcp any host 192.168.1.9 eq www (hitcnt=0) 0x83af39ca

access-list ACLOUT line 4 extended deny ip any any (hitcnt=0) 0x2ca30385

Internet

192.168.6.10

Web Server172.16.1.2

192.168.1.9ACLIN

ACLOUT

Page 106: Security - Cisco Firewall TRAINING

ACL LoggingACL Logging

Enables the logging option for inbound ICMP to 192.168.1.11

asa1(config)# access-list OUTSIDE-ACL permit icmp any host 192.168.1.11 log 7 interval 600

ciscoasa(config)#

ACL Syslog

Messages

access-list id [line line-number] [extended] {deny | permit} {protocol | object-group protocol_obj_grp_id}{host sip | sip smask | interface ifc_name | object-group network_obj_grp_id | any} [operator port [port] | object-group service_obj_grp_id] {host dip | dip dmask | interface ifc_name | object-group network_obj_grp_id | any} [operator port [port] | object-group service_obj_grp_id | object-group icmp_type_obj_group_id] [log [[level] [interval secs] | disable | default]] [inactive | time-range time_range_name]

Internet

Syslog

Server

Page 107: Security - Cisco Firewall TRAINING

ACL CommentsACL Comments

asa1(config)# access-list ACLOUT line 2 remark WebMailA access-list

Inserts ACL comment

ciscoasa(config)#

access-list id [line line-number] remark text

asa1(config)# show access-list

access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096) alert-interval 300

access-list ACLOUT; 6 elements

access-list ACLOUT line 1 extended permit tcp any host 192.168.1.7 eq www (hitcnt=0) 0x3df6ed1e

access-list ACLOUT line 2 remark WebMailA access-list

access-list ACLOUT line 3 extended permit tcp any host 192.168.1.8 eq www (hitcnt=0) 0xd5383eba

access-list ACLOUT line 4 extended permit tcp any host 192.168.1.9 eq www (hitcnt=0)0x2c4288ad

access-list ACLOUT line 5 extended permit tcp any host 192.168.1.10 eq www (hitcnt=0) 0xb70c935b

access-list ACLOUT line 6 extended permit tcp any host 192.168.1.11 eq www (hitcnt=0) 0x8b43382e

former line 2

Page 108: Security - Cisco Firewall TRAINING

Inbound HTTP Access SolutionInbound HTTP Access Solution

Permits outside HTTP traffic to access the public web server

asa1(config)# static (DMZ,outside) 192.168.1.9 172.16.1.2 0 0

asa1(config)# access-list ACLOUT permit tcp any host 192.168.1.9 eq www

asa1(config)# access-group ACLOUT in interface outside

192.168.1.0

10.0.1.0

Public Web Server

DMZ

Inside

Outside.2.1

192.168.1.9

172.16.1.2

Inbound

Internet

Page 109: Security - Cisco Firewall TRAINING

icmp Commandicmp Command

Enables or disables pinging to an interface

asa1(config)# icmp permit any echo-reply outside

asa1(config)# icmp permit any unreachable outside

ciscoasa(config)#

icmp {permit | deny} {host sip | sip smask | any} [icmp-type] if_name

Outside Inside

ICMP Echo

ICMP UnreachableX

Permits all unreachable messages at the outside interface and denies all ping requests at the outside interface

Internet

Page 110: Security - Cisco Firewall TRAINING

SummarySummary

ACLs enable you to determine which systems can establish connections through your security appliance.

With ICMP ACLs, you can disable pinging to a security appliance interface so that your security appliance cannot be detected on your network.

.

Page 111: Security - Cisco Firewall TRAINING

Lession 5Lession 5

Cisco Adaptive Security Device

Manager

Page 112: Security - Cisco Firewall TRAINING

ASDM Overview and Operating Requirements

Page 113: Security - Cisco Firewall TRAINING

What Is ASDM?What Is ASDM?

ASDM is a browser-based configuration tool designed to help configure and monitor your security appliance.

Internet

SSL Secure Tunnel

Page 114: Security - Cisco Firewall TRAINING

ASDM FeaturesASDM Features

Runs on a variety of platforms Implemented in Java to provide robust, real-time monitoring Works with SSL to ensure secure communication with the PIX security

appliance Comes preloaded in flash memory on new Cisco ASA and Cisco PIX

security appliances running Versions 7.2 and later ASDM sessions

• 5 ASDM sessions per unit (single mode) or context (multiple mode)

• 32 sessions per unit in multiple mode Operates on PIX 515E, 525, and 535* Security Appliances Operates on Cisco ASA 5505, 5510, 5520, 5540, and 5550 Security

Appliances

* ASDM Version 5.2 is not supported on the PIX 501 or 506 Security Appliance.

Page 115: Security - Cisco Firewall TRAINING

ASDM Security Appliance ASDM Security Appliance RequirementsRequirements

* ASDM Version 5.2 requires Security Appliance Software Version 7.2.

A security appliance must meet the following requirements to run ASDM:

Activation key that enables DES or 3DES

Supported Java plug-in

Security appliance software version compatible with the ASDM software version you plan to use*

Hardware model compatible with the ASDM software version you plan to use

Page 116: Security - Cisco Firewall TRAINING

ASDM Browser RequirementsASDM Browser Requirements

To access ASDM from a browser, the following requirements must be met:

JavaScript and Java must be enabled on the computer where the browser resides.

SSL must be enabled in the browser.

Popup blockers may prevent ASDM from starting.

Page 117: Security - Cisco Firewall TRAINING

Supported PlatformsSupported Platforms

Windows Sun Solaris Linux

Page 118: Security - Cisco Firewall TRAINING

Running ASDMRunning ASDM

Run ASDM as a: Local

application Java applet

Launch Startup Wizard

Page 119: Security - Cisco Firewall TRAINING

Configure the Security Appliance to Configure the Security Appliance to Use ASDMUse ASDM

Before you can use ASDM, you need to enter the following information on the security appliance via a console terminal:

Time Inside IP address Inside network mask Host name Domain name Enable the HTTP server on the security appliance IP addresses of hosts authorized to access

HTTP server

If more than one ASDM image is stored in the flash memory of your security appliance, also specify the ASDM image to be used.

Page 120: Security - Cisco Firewall TRAINING

Setup DialogSetup Dialog

Pre-configure Firewall now through interactive prompts [yes]? <Enter>

Firewall Mode [Routed]:

Enable Password [<use current password>]: cisco123

Allow password recovery [yes] ?

Clock (UTC)

Year [2006]: <Enter>

Month [Sep]: <Enter>

Day [2]: <Enter>

Time [10:21:49]: <Enter>

Inside IP address: 10.0.1.1

Inside network mask: 255.255.255.0

Host name: asa1

Domain name: ciscoasa.com

IP address of host running Device Manager: 10.0.1.11

Use this configuration and write to flash? Y

Page 121: Security - Cisco Firewall TRAINING

Navigating ASDM Configuration Windows

Page 122: Security - Cisco Firewall TRAINING

ASDM Home WindowASDM Home Window

Main toolbar

Device

Information

General

LicenseVPN Status

System

Resources

Interface

Status

Traffic

Status

Menu bar

Syslog Messages

Page 123: Security - Cisco Firewall TRAINING

ASDM Home Window (Cont.)ASDM Home Window (Cont.)

License tab

Page 124: Security - Cisco Firewall TRAINING

Startup WizardStartup Wizard

Startup Wizard Interfaces NAT and PAT Hostname Domain name Enable

password

Page 125: Security - Cisco Firewall TRAINING

VPN WizardVPN Wizard

VPN Wizard Site-to-Site Remote

Access

Note: Use Configuration > VPN to edit VPN connections.

Page 126: Security - Cisco Firewall TRAINING

High Availability and Scalability High Availability and Scalability WizardWizard

High Availability and Scalability Wizard Active/Active

Failover

Active/Standby Failover

VPN Cluster Load Balancing

Page 127: Security - Cisco Firewall TRAINING

Configuration WindowConfiguration Window

Configuration Interface Security

Policy NAT VPN IPS or CSD

Manager Routing Global

Objects Properties

Page 128: Security - Cisco Firewall TRAINING

InterfacesInterfaces

IP address

– Static

– DHCP

Same security level

Page 129: Security - Cisco Firewall TRAINING

Security PolicySecurity Policy

Access Rules

AAA Rules

Filter Rules

Service Policy Rules

Page 130: Security - Cisco Firewall TRAINING

NATNAT

Translation Rules• NAT• Policy NAT• NAT

exemption• Maximum

connections• Embryonic

connections NAT0

Page 131: Security - Cisco Firewall TRAINING

VPNVPN

Edit VPN General IKE IPsec IP Address

Management Load Balancing NAC WebVPN E-Mail Proxy

Note: Use the Remote Access or Site-to-Site VPN Wizard for new VPN connections.

Page 132: Security - Cisco Firewall TRAINING

RoutingRouting

Static Routes

Dynamic Routing

– OSPF

– RIP

Multicast

– IGMP

– MRoute

– PIM

Proxy ARPs

Page 133: Security - Cisco Firewall TRAINING

Global ObjectsGlobal Objects

Network Object Groups

IP Names Service Groups Class Maps Inspect Maps Regular

Expressions TCP Maps Time Ranges

Page 134: Security - Cisco Firewall TRAINING

Monitoring ButtonMonitoring Button

Interfaces VPN IPS or Trend

Micro Content Security

Routing Properties Logging

Page 135: Security - Cisco Firewall TRAINING

The Interface Graphs panel enables you to monitor per-interface statistics, such as bit rates, for each enabled interface on the security appliance.

Interface Graphs PanelInterface Graphs Panel

Page 136: Security - Cisco Firewall TRAINING

Packet TracerPacket Tracer

Interface

Source IPSource port

Destination IP

Destination port

Flow lookup

Route lookup

Access list

Page 137: Security - Cisco Firewall TRAINING

Options > PreferencesOptions > Preferences

Options

Page 138: Security - Cisco Firewall TRAINING

ToolsTools

Tools Command Line

Interface Packet Tracer Ping Traceroute File

Management Ugrade

Software Upload ASDM

Assistant Guide System Reload ASDM Java

Console

Page 139: Security - Cisco Firewall TRAINING

Help Help

Help Help Topics Help for

Current Screen

Release Notes

Getting Started

VPN 3000 Migration Guide

Glossary ….

Page 140: Security - Cisco Firewall TRAINING

Online Help Online Help

Page 141: Security - Cisco Firewall TRAINING

SummarySummary

ASDM is a browser-based tool used to configure your security appliance. Minimal setup on the security appliance is required to run ASDM. ASDM contains several tools in addition to the GUI to help you configure your

security appliance. The following ASDM wizards are available to simplify security appliance

configuration:• Startup Wizard: Walks you step by step through the initial configuration of

the security appliance• VPN Wizard: Walks you step by step through the creation of site-to-site

and remote access VPNs• High Availability and Scalability Wizard: Walks you step by step through

the configuration of active/active failover, active/standby failover, and VPN cluster load balancing

Page 142: Security - Cisco Firewall TRAINING

Lession 6Lession 6

Firewall Switch Modules (FWSM)

Page 143: Security - Cisco Firewall TRAINING

OverviewOverview

• The Cisco Firewall Services Module (FWSM) is based on Cisco PIX Security Appliance technology, and therefore offers the same security and reliability

• The FWSM is a line card for the Cisco Catalyst

6500 family of switches and the Cisco 7600 Series Internet routers.

<#>

Page 144: Security - Cisco Firewall TRAINING

FWSM Key FeaturesFWSM Key Features

• Brings switching and firewalls into a single chassis

• Based on PIX Firewall technology

• Supports transparent or routed firewall mode

• Up to 100 security contexts

– Up to 256 VLANs per context

– Up to 1000 VLANs all contexts

• 5-Gbps throughput

• One million concurrent connections

• 100,000 connections per second

• Multiple blades supported in one chassis (4 maximum)

• Dynamic routing via RIP v1 and v2 and OSPF

• High availability via intra- or inter-chassis stateful failover

<#>

Page 145: Security - Cisco Firewall TRAINING

FWSM and PIX Firewall FeatureFWSM and PIX Firewall FeatureComparisonComparison

<#>

Page 146: Security - Cisco Firewall TRAINING

Network ModelNetwork Model

<#>

Page 147: Security - Cisco Firewall TRAINING

MSFC placementMSFC placement

<#>

Page 148: Security - Cisco Firewall TRAINING

Getting Started with the FWSMGetting Started with the FWSM

Before you can begin configuring the FWSM,

complete the following tasks:

• Verify FWSM installation.

• Configure the switch VLANs.

• Configure the FWSM VLANs.

<#>

Page 149: Security - Cisco Firewall TRAINING

Verify FWSM InstallationVerify FWSM Installation

<#>

Page 150: Security - Cisco Firewall TRAINING

Configure the Switch VLANsConfigure the Switch VLANs

<#>

Create Vlan

Defines a controlled VLAN on the MSFC. Assigns an IP address.

Page 151: Security - Cisco Firewall TRAINING

Firewall VLAN-GroupFirewall VLAN-Group

Attaches the VLAN and firewall group to the slot where the FWSM is located

Creates a firewall group of controlled VLANs

Page 152: Security - Cisco Firewall TRAINING

Configure the FWSM InterfacesConfigure the FWSM Interfaces

<#>

Establishes a console session with the module Processor should always be 1

Page 153: Security - Cisco Firewall TRAINING

Configure a Default RouteConfigure a Default Route

• Default route• Static routes are required in multiple context mode.

Page 154: Security - Cisco Firewall TRAINING

Configure the FWSM Access-ListConfigure the FWSM Access-List

FWSM1(config)# access-list 200 permit ip 10.1.1.0 255.255.255.0 anyFWSM1(config)# access-group 200 in interface inside

By default all traffic is denied through the FWSM.• Traffic permitted into an interface can exit through any other interface

Page 155: Security - Cisco Firewall TRAINING

Resetting and Rebooting the FWSMResetting and Rebooting the FWSM

Resets and reboots the FWSM

Page 156: Security - Cisco Firewall TRAINING

SummarySummary

• The FWSM is a line card for the Cisco Catalyst

6500 family of switches and the Cisco 7600 Series Internet routers.

• The FWSM is a high-performance firewall solution based on PIX Firewall Security Appliance technology.

• The FWSM supports transparent and routed firewall modes.

• The FWSM commands are almost identical to security appliance commands.

• PDM can be used to configure and monitor

the FWSM.